Received: by 10.223.148.5 with SMTP id 5csp6440051wrq; Wed, 17 Jan 2018 13:50:53 -0800 (PST) X-Google-Smtp-Source: ACJfBosh3SZxbGslOIkvlLvTBDiUlAcr/2hagwXI+/kmdg5TuQCH94w9x89ekHJHXgdZrkSlknyV X-Received: by 10.84.241.129 with SMTP id b1mr22321526pll.435.1516225852985; Wed, 17 Jan 2018 13:50:52 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1516225852; cv=none; d=google.com; s=arc-20160816; b=GAHbT0bn+Gina9fIl3SdcdIAerr2x5zyu0Oq+ss2vAwlNFzKO931hARJc3e8j0SxNc pop0rhR7uhDod3Yjs9UgvjBPXcdKuGaUz5ooYtFUt4Yj3++4UCJGJaO1+dThJ07/Nf/P cr3mQ94POPcSbElxCacbAB0Pj6egSAHnKN5fv68WYOnmTRrcRoO7jS7/GlfC+yyxEyTw yFKLVMbV3JemN6ios5bsdB99sXRN60lC5w12/kRSW4QexMt2fjGy+cURpt8jj7XrtrEk eH1lrxd4LKKq0ULBPLcmORpDcJ+I2AAGT5y0Zu6rhCmmgrTuCvP7Ne+DE7IESKrhTtCO pFfA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:from:subject:cc:to:message-id:date :arc-authentication-results; bh=87/BXV+6T4/P63V9mDX2iWiZ1/SZ/z82Ny4M2fjyOyc=; b=hc7WrYeRZRaeeI9GF8Q+apo95UqBlNUMO455dv3PBeNV51igSsv4tE1pVifQ4YFbv/ QwWns/xjDqRbp7o9ESkhu5SOY+lOJO3FsZlDBPIqiCPkGSktOMv7c7s2YxpAqy3mh8zt b18i4Fs2J5orO04CTza+Q2KXcgTr2OebYFLWdrK6EFNBoqHLxFUHuN/+2Sah/Qw+Czxj vAYhZ3SYG2boxEhb+ayk6OTDpeb6DST3EwiK2nut/Fz57oLpAGRvH53Cwca/no+GytpL YFNSa4JgB+BrZsxOA5NRabqgdaIWDMdBitOH2/0c9UbFhgLGr1fXbAigRE/iRHHYHeml /GEQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id y2si1107136pgo.193.2018.01.17.13.50.38; Wed, 17 Jan 2018 13:50:52 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1753514AbeAQVth (ORCPT + 99 others); Wed, 17 Jan 2018 16:49:37 -0500 Received: from shards.monkeyblade.net ([184.105.139.130]:37550 "EHLO shards.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752746AbeAQVtg (ORCPT ); Wed, 17 Jan 2018 16:49:36 -0500 Received: from localhost (67.110.78.66.ptr.us.xo.net [67.110.78.66]) (using TLSv1 with cipher AES256-SHA (256/256 bits)) (Client did not present a certificate) (Authenticated sender: davem-davemloft) by shards.monkeyblade.net (Postfix) with ESMTPSA id A47DF13401A23; Wed, 17 Jan 2018 13:49:33 -0800 (PST) Date: Wed, 17 Jan 2018 16:49:32 -0500 (EST) Message-Id: <20180117.164932.1269304606476934540.davem@davemloft.net> To: torvalds@linux-foundation.org Cc: efault@gmx.de, peterz@infradead.org, edumazet@google.com, dima@arista.com, frederic@kernel.org, linux-kernel@vger.kernel.org, 0x7f454c46@gmail.com, akpm@linux-foundation.org, fweisbec@gmail.com, hannes@stressinduktion.org, mingo@kernel.org, alexander.levin@verizon.com, pabeni@redhat.com, paulmck@linux.vnet.ibm.com, rrendec@arista.com, riel@redhat.com, sgruszka@redhat.com, tglx@linutronix.de, wanpeng.li@hotmail.com Subject: Re: [RFC 1/2] softirq: Defer net rx/tx processing to ksoftirqd context From: David Miller In-Reply-To: References: <1515782670.7007.3.camel@gmx.de> <20180117.153049.1803664333084879932.davem@davemloft.net> X-Mailer: Mew version 6.7 on Emacs 25.3 / Mule 6.0 (HANACHIRUSATO) Mime-Version: 1.0 Content-Type: Text/Plain; charset=us-ascii Content-Transfer-Encoding: 7bit X-Greylist: Sender succeeded SMTP AUTH, not delayed by milter-greylist-4.5.12 (shards.monkeyblade.net [149.20.54.216]); Wed, 17 Jan 2018 13:49:35 -0800 (PST) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Linus Torvalds Date: Wed, 17 Jan 2018 13:06:58 -0800 > It was in some way always a "poor mans interrupt thread" (with no > blocking like a real thread context, but at least not impacting actual > interrupt latency). Or in this loopback device case (and tunnel decapsulation) a poor man's longjmp, releasing the current stack frame to keep the depth in check. Anyways... > That said, this made me wonder a bit. I wonder how bounded the latency > is for raising a softirq from process context. We only _check_ the > softirq on the last hardirq exit, I think. System call return checks it, otherwise this situation would be completely bolixed. > I wonder if we should run softirqs on return to user mode (and make > softirq set a thread flag if not in interrupt context). I'm pretty sure we already do.